Expert Opinions

Device Accountability on the Internet

Keith Frederick is the CISO at Viasat and serves on our Advisory Board. We are honored to have his expertise, as his insights into digital security are invaluable as we bring our Zero Trust Identity and Access Management solutions to market. He also happens to be a former colleague and close friend of mine. I thank Keith’s service to his country but more so, admire his passion to give his decades of cybersecurity expertise back to the community – specifically protecting the average American citizen – who has been scammed, exploited and financially damaged by online criminal hackers.

Written by:
Brendan Sullivan--Chief Executive Officer
Brendan Sullivan--Chief Executive Officer
Published on:
April 2, 2025
Device Accountability on the Internet

Identity fraud costs Americans over $50 billion each year with no significant improvement on the horizon. Making it clear that change is needed to better protect citizens online.  

Keith has authored a white paper, "Device Accountability on the Internet”, that explores the concept of device accountability on the internet through the enforcement of NSA and NIST's Zero Trust Model. It emphasizes the critical role of accountability in cybersecurity and aligns with the principles of Zero Trust to mitigate threats.  He succinctly argues that the best protection against fraud, imposters, and deep fakes, is essentially the elimination of anonymity, while honoring privacy.  The paper provides a strategic approach to implementing Zero Trust, detailing its necessity in modern cybersecurity frameworks and offering practical enforcement mechanisms. By integrating Zero Trust maturity models, the document advocates for a proactive security stance to enhance resilience in digital environments. His recommendations are exactly in line with what Invisinet espouses in industrial internet of things (IIoT) with our Zero Trust Authentication Platform (ZTA) that delivers proactive, identity-based security solutions. The foundation of this technology is about tokenizing trusted Identity and passing at the network layer.

  • First Packet Authentication™: Blocks unauthorized scanning and access from the first interaction.  
  • Identity-Based Micro-Segmentation: Prevents lateral movement and protects sensitive data.  
  • Seamless IT-OT Integration: Applying this at the network layer makes it compatible for legacy OT environments and 30 years of legacy networks.
  • Regulatory Compliance: Gives you the audit trail needed for emerging regulatory standards like NIS2.

More importantly, this white paper does not seek to eliminate internet freedom or restrict privacy but to introduce accountability as a fundamental principle, ensuring that the Internet remains a secure and productive space for all users.  We are completely aligned that safety and privacy are not mutually exclusive. But something must be done to stop this seemingly never-ending cycle of crime against the average citizen, and the continual destabilization of our critical infrastructure by state sponsored bad actors. With the U.S. in a position to implement these policies globally, the time to act is now.

I encourage you to read Keith’s thoughts and recommendations here.  If you would like to learn more about Invisinet, please contact us.

Table of contents
sign up for newsletter
Receive updates on Invisinet’s solutions and security insights.